SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)



Similar documents
Compliance Management, made easy

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Feature. Log Management: A Pragmatic Approach to PCI DSS

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Guideline on Auditing and Log Management

QRadar SIEM 6.3 Datasheet

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

How To Buy Nitro Security

Payment Card Industry Data Security Standard

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

PCI Compliance for Cloud Applications

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Boosting enterprise security with integrated log management

Clavister InSight TM. Protecting Values

Review: McAfee Vulnerability Manager

Security Information Lifecycle

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

IBM Tivoli Netcool Configuration Manager

The Sumo Logic Solution: Security and Compliance

Application Security in the Software Development Lifecycle

DEMONSTRATING THE ROI FOR SIEM

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

The SIEM Evaluator s Guide

Meeting PCI Data Security Standards with

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

SANS Top 20 Critical Controls for Effective Cyber Defense

Demonstrating the ROI for SIEM: Tales from the Trenches

Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

Symantec Security Information Manager 4.8 Release Notes

What is Security Intelligence?

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM)

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

PCI DSS Top 10 Reports March 2011

A practical guide to IT security

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Symantec Security Information Manager Administrator Guide

TRIPWIRE NERC SOLUTION SUITE

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

IBM Security QRadar Risk Manager

Extreme Networks Security Analytics G2 Vulnerability Manager

Automate PCI Compliance Monitoring, Investigation & Reporting

IBM QRadar Security Intelligence April 2013

Active Directory Auditing The Need and Result

Caretower s SIEM Managed Security Services

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Breaking down silos of protection: An integrated approach to managing application security

Securing and protecting the organization s most sensitive data

PCI Requirements Coverage Summary Table

IT Security & Compliance. On Time. On Budget. On Demand.

PCI Requirements Coverage Summary Table

PCI DSS Reporting WHITEPAPER

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Protect Your Connected Business Systems by Identifying and Analyzing Threats

PCI Data Security Standards (DSS)

LogRhythm and PCI Compliance

Q1 Labs Corporate Overview

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

IBM Security QRadar Risk Manager

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

Achieving Compliance with the PCI Data Security Standard

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Real-Time Security for Active Directory

Vulnerability. Management

LOG MANAGEMENT: BEST PRACTICES

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

North American Electric Reliability Corporation (NERC) Cyber Security Standard

The Comprehensive Guide to PCI Security Standards Compliance

Introduction. PCI DSS Overview

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

Extreme Networks Security Analytics G2 Risk Manager

How To Manage Log Management

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

Continuous Network Monitoring

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

IBM Security QRadar Vulnerability Manager

How To Manage Security On A Networked Computer System

Transcription:

E-SPIN PROFESSIONAL BOOK SECURITY MANAGEMENT SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMPLIANCE MANAGEMENT,PROACTIVE MONITORING,THREAT MANAGEMENT FORENSICS & TRACEABILITY

Editor s Summary E-SPIN Comprehensive Professionals Book on Security Management helps to face a greater challenge when prioritizing just where their limited budgets should be invested in order to emerge as strong, viable companies. Security Management is possibly today's most overlooked aspect to enjoy advanced correlation, searches, reporting and displays for security incidents across any IT infrastructure. One area where the tools can provide the most needed help is in compliance. Corporations increasingly face the challenge of staying accountable to customers, employees and shareholders, and that means protecting IT infrastructure, customer and corporate data, and complying with rules and regulations as defined by the government and industry. A lot has happened in the past few months, including an increased international growth that now has taken us further into the global markets. As a sole distributor In Malaysia, ImmuneSecurity products are part of E-SPIN s Security Management Solution Portfolio to to manage Dashboards that are user configurable depending on roles and responsibilities and have a secure, centralized log archive that automatically analyzes log messages in real-time. E-SPIN Professional book on Security Management will focuses on Security Information and Event Management (SIEM), Compliance Management, PCI Data Security Standards, Vulnerability Assessment, Managed Services, and security concerns. By reading this book, organizations, firms and companies should consider adopting Security Information and Event Management (SIEM) solutions in the areas of security management providing a platform that extracts intelligent events and incidents from the millions of logs that today exists in an IT infrastructure of any size. Finally, till we meet again in the next issue and happy reading. Chief Of Editor, Madeline Lim

TABLE OF CONTENTS Chapters Page CHAPTER 1 Introduction of Security Information and Event Management... 1-5 CHAPTER 2 Compliance Management... 6 CHAPTER 3 - PCI Data Security Standards...7 CHAPTER 4 Vulnerability Assessment...8 CHAPTER 5 Managed Service...9 CHAPTER 6 SIEM Security Concerns...10

SIEM MADE EASY Robust. Dynamic. Unparalleled. Today s extreme digital, IT and economic climates are increasingly demanding more from your company than ever before. But balancing cybercrime security, compliance regulations and the optimization of IT systems is a delicate act particularly when budgets are under strain. Many organizations are realizing that a rich solution can turning SIEM into true business value, thanks to several key wins: Automated compliance and regulatory processes. Improved efficiency in forensic investigations. Increased troubleshooting turnaround. An overall improved security posture. LogPoint 5.1 ROI, made easy. ImmuneSecurity s LogPoint 5.1 solution was created with your business value in mind. Inspired by the needs of our customers and partners, LogPoint 5.1 incorporates SIEM innovations that translate into a welcome return on your investment. Proactive Monitoring. When services are IT dependent, unexpected performance issues and security breaches can severely impact a company's competitiveness.logpoint 5.1 allows you to quickly respond to unexpected situations and problems before business performance are affected or revenue is lost. Threat Management. Investigations into IT and cybercrimes have revealed that more organizations are being exposed to internal as well as external attacks across the board. And these attacks are growing more complex and targeted as well as more silent, efficient and harder to discover. LogPoint 5.1 is the one-stop-shop for detecting complex, external attacks and overlooked internal fraud across your enterprise no matter the size. Forensics & Traceability. Enterprises of all scales face the task of finding and gathering information from multiple data logs. And keeping track of these logs steals precious time away from your other security needs. LogPoint 5.1 is a single, secure and compliant-ready warehouse for all log data allowing you to analyze all data uniformly. Response time is minimized, events across the entire infrastructure are quickly alerted and easily addressed, and authorities and auditing firms can easily be given necessary documentation for investigation or analysis.

Compliance Management. The burden of regulatory compliance has grown significantly heavier for nearly every industry. The list of regulations is long and potential penalties are significant.logpoint 5.1 provides the foundation for meeting compliance, but can also be the first step towards a truly effective security strategy. It allows you to focus on the right choices and core issues for your security solutions as you swiftly reach your compliance requirements. Data Enrichment. Logs alone don t always give you the answers they often lack the data you need to know. Organizations often burden themselves by launching unnecessary measures to search for this data, including manual processes, routines for executing proper controls, and spot checks in compliance with regulations or security controls. LogPoint 5.1 offers dynamically enriched log messages from external as well as internal data sources enabling complex correlation and analysis features.

LogInspect v5.1.1 ImmuneSecurity proudly presents LogInspect version 5.1.1. This version contains numerous enhancements as well as some bug fixes. The highlights for this release are: Introduction of LI Lite for distributed collection of logs from remote locations. Higher availability of logs from the main LogInspect can be made by creating a copy of a repo in the remote LogInspect. Introduction of tenants for effective object management between various organizational units. Enhancements A selection of the major enhancements of LogInspect v5.1.1 is listed below in detail. Devices and Collection Logs can be forwarded into the system from different platforms using the Distributed Collector. This support is available for LI Lite at the moment. IPv6 support is extended to the following collectors and fetchers: SNMP fetcher, sflow collector,fileinspect collector, SNMP trap collector and the netflow collector. The CIDR IP address, is supported for all of the collectors. Log parser's pattern can be validated by checking against the example message. SNMP fetcher works for leaf OIDs. Search and Queries Fields in search query can now be renamed. Grouping constructs support "order by" syntax. Inline list now supports, using whitespace enclosed by quotes. Cmd + click (Ctrl + click) opens and displays the search result on a new tab. Dashboard and User Interface Growl position setting, can now be managed from preferences page. Dashboard tabs are now moveable.

User Management LDAP authentication supports three different login formats: "Sam Account Name", "UID" and "DN". This can be configured from "Advance LDAP Settings". SSL implemented for Directory Access Protocol (LDAP Strategy). Username is now made non editable. Correlation and Alert Ownership of rules can be transferred to other users. System and Performance Critical security updates for the system can be applied by uploading the tested security patch and installing them. Backup and Storage Backup scheduling is made optional. For backups, its now possible to apply a retention policy. FileInspect Windows events can now be collected, by using the "Windows Event Log Reader" checkmark, while configuring the FileInspect client. Reporting Queries in reports templates are now editable. Bug Fixes A selection of the major bug fixes of LogInspect v5.1.1 is listed below. Netflow v9 now contains all available fields. HTTPS certificate can now be applied, without rebooting the server. Problem with configuration backup has been fixed. Vendor dashboard can now be used through the "use action".

Compliance Management a daunting task? Security compliance requirements are normally a highly time-consuming and expensive task. Companies must not only interpret audit requirements and controls, they also face managing extreme volumes of log data all this while facing regulations at federal, state, and industry levels. Not only are these mandates costly and complicated, failure to comply can result in huge financial losses from fines, notification costs, legal issues and damaged reputations. A compliance opportunity. The LogPoint 5.1 SIEM solution goes beyond enabling compliance. It provides the opportunity to prove you are implementing and monitoring the required processes. And it gives you a powerful tool to protect and secure your company s data. LogPoint 5.1 s compliance solution allows for ease when meeting compliance requirements, thanks to: Compliance standard pre-sets. Meet compliance obligations quickly, easily and efficiently. Tailored reports. Easy, quick and customizable. Full auditing trails. Track and trace your data with ease. Log capture & storage. Secure and security-signed for evidence and forensics. Additionally, LogPoint 5.1 supports out-of-the-box compliance and regulatory requirements, including: PCI-DSS SOX ISO 17799 (auditing and monitoring) ISO 27001 including ds484:2005 Basel II HIPAA FISMA Many more...

PCI DATA SECURITY STANDARDS (PCI-DSS) PCI compliance, made easy. PCI the Payment Card Industry data security standard. PCI standard mandates that merchants and service providers storing, processing, or transmitting credit card data must comply with a multitude of requirements. The consequences of not meeting compliance are costly and include fines, notification costs, legal issues and brand damage. Don t just log detect, stop, and remedy. Typical log management solutions merely collect, store, and report on raw event Logs. But meeting PCI requirements is more than simply checking the box. Assuring that proper controls are in place and effective requires more than just plugging in a log management tool and forgetting about it. Simple and cost effective. LogPoint 5.1 adds an additional layer of security intelligence by employing multiple layers of correlation technology packaged with detection, security and remedy capabilities. It not only helps you meet the most stringent PCI compliance obligations, it helps you fulfill your unique security intelligence needs assuring that you do not have to overinvest your time, budget and resources. SARBANES-OXLEY-SOX SOX for security best practices & proactive risk management. The Sarbanes-Oxley Act (SOX) was designed to protect investors by improving the accuracy and reliability of corporate disclosures made in accordance with securities laws. SOX standards must be followed or companies face strict penalties for non-compliance. Manageable and cost effective. A properly implemented risk-based approach to auditing for SOX compliance can make SOX more manageable. It can also reduce the associated cost and help ensure the adequacy of controls and the integrity of financial reporting. With LogPoint 5.1, a company can achieve security best practices and continuously manage risk through: Data collection Log management Real-time monitoring Threat identification Rapid response Actionable reporting

VULNERABILITY ASSESSMENT Vulnerability scanning prevents successful attacks in a business network An Outpost24 solution automatically identifies security flaws in your network and gives an important overview of what an attacker could achieve by attacking your high-value assets. To a cyber-criminal, vulnerabilities on a network are hidden gateways to gain access to the high-value assets in your organization. When exposed, these vulnerabilities can be targeted for exploitation, and consequently provide fuel for stolen identities, trigger theft of business secrets, violate privacy provisions of laws and regulations or right-out paralyze operations. Organizations are forced to continuously maintain the protection of their networks. Traditionally, this has been accomplished by creating barriers against attacks by investing in reactive security tools such as firewalls, anti-virus tools and intrusion detection systems. In today's environment these reactive mechanisms simply are not enough. Instead of waiting for attacks to occur, there is a need to take a proactive approach. Only by using proactive security tools that continuously identify security risks, it is possible to effectively manage and reduce the risk exposure. Legislation and compliance with security requirements are also becoming more demanding. The PCI (Payment Card Industry) security standards, Sarbanes-Oxley (SOX) among others all include requirements for regular testing of network security. Outpost24 is dedicated to offering turnkey solutions based on a true proactive approach. Every day, we assist over 1,000 customers world-wide in securing their valuable assets and ensuring compliance with policies and regulations. Our solutions can be immediately deployed and are always accompanied by our well-appreciated 24/7 security expert support. ImmuneSecurity has exclusive distribution rights of all Outpost24 products in Denmark.

MANAGED SERVICES Highly Specialized Services Log Management and Vulnerability Assessment Management solutions from ImmuneSecurity within are often combined with a tailored managed service delivered on a weekly, monthly or quarterly basis. The impact of implementing these often complex IT security solutions consumes many key resources within an organization. A managed service will ease the internal workload and the organization can concentrate on analyzing the key findings summarized by the ImmuneSecurity professionals. Other key benefit from using a managed service is to have a neutral and external party deliver an IT security report on a frequent basis this ensures that all IT breaches are covered and the desired level of security can be maintained. The main driver for managed service subscriptions are assurance of compliance e.g. PCI, SOX, DS484 by letting ImmuneSecurity deliver on-time quality compliance reporting and suggestions to remediation.

SIEM Security Concerns Most organizations face the same inherent challenges when dealing with security information and event management (SIEM): effectively balancing limited IT resources, ever-increasing supplies of log data, dealing with regulation compliance, and keeping staff training up-to-date. There are four best challenges that organizations should consider to achieve this balance: Prioritize security information and event management appropriately throughout organizations Organizations can define requirements and goals for performing logging and monitoring logs to include applicable laws, regulations, and existing organization policies. They can then prioritize goals based on balancing risk with time and resources needed to manage logs Establish policies and procedures for security information and event management Policies and procedures are beneficial because they ensure consistent approaches throughout organizations as well as ensure that laws and regulations are observed. Periodic audits can confirm that logging standards and guidelines are followed throughout organizations. Furthermore, testing and validating can properly ensure log management policies and procedures Create and maintain robust security information and event management infrastructures Having secure log management infrastructures aids in preserving the integrity of log data from accidental or intentional modifications or deletions and in maintaining confidentiality. It is also critical for creating scalable infrastructures for handling expected volumes of log data as well as peak volumes during extreme situations (e.g. widespread malware incidents) Provide proper training for all staff with security information and event management responsibilities While defining log management schemas, organizations must provide requisite training to relevant staffers regarding their log management responsibilities as well as skilled instruction on the resources necessary to support log management. This includes providing log management tools, tool documentation, technical guidance on log management, and disseminating information to log management staffers.